Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe
-
Size
49KB
-
MD5
8be4b597791b05a1c5f690f0a4407d2e
-
SHA1
2ce923936bf67891fc32fdf6aaff018c9885d53b
-
SHA256
f7fd13d115b277b9eed6d13512a8db4041bb07d6f94a3989d2ec43dac9e4791c
-
SHA512
277f05d5ccf9ccd8b738dc41315a6b1f6d11adea2aa954d3f73c9aac0ca7920ee235ea5e75dca97ac31c21e93181cc56c6cf6aea0ca441441cc9cc556107193b
-
SSDEEP
768:EnQje5SMCj8rlhWrarTCFxNVDkEHbyobb59ZJuRbvIh2XCeQM2iJc9PA:65S58aWHgxNVDZ7T5duRbvy9vPA
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Windows\\system32\\cfg.exe" 8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Loads dropped DLL 1 IoCs
pid Process 2548 IEXPLORE.EXE -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\0070.DLL 8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\0070.DLL 8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe File created C:\Windows\SysWOW64\cfg.exe 8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cfg.exe 8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429570748" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10AC4381-5822-11EF-98A3-428A07572FD0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2688 2236 8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2688 2236 8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2688 2236 8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2688 2236 8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2548 2688 iexplore.exe 31 PID 2688 wrote to memory of 2548 2688 iexplore.exe 31 PID 2688 wrote to memory of 2548 2688 iexplore.exe 31 PID 2688 wrote to memory of 2548 2688 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8be4b597791b05a1c5f690f0a4407d2e_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -nohome2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8f74b0d65789f3da673d4dbd85f21c7
SHA1f3708f4a38af7bdf29e9ee1e4bdbff3f0b16921c
SHA2565d5f3155136f86d62f95edc35b74b0b22572fed78a1340bdef074388aa339562
SHA512e3afd9e774d71ef6dbfa0c1879b0e63b25173a725fe3436bdb8d93414a17526af149650cafde2a43f5ae6aa7fa4048445240713592731061186bcfd821e271f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab293513d76b41050562e83a042a9828
SHA1aae799b7b71af4c08a5641c0067fe2b37bce68c1
SHA25621725b5a7fbf991c53d8ef0822188e8cf8ebbf2a65d7901bf5e9c5c83b28b765
SHA512fb085f08ba5ddab68855540c807b1077aa39bf8aeabec7db175a11fcdde715e40047f13904ad7f2acdbf315bbbcc5945778ee8e1bec9cdfc2da7d36abcf0b8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc2b1eb5a487d94dfeedade3f3512d2
SHA1106465e0a6ce6609d0a9c30b000ae9b93ba52b3f
SHA256a05facb29b2027da40ed32142061a82732d18f5ce4f5d299c85425c60ffd3639
SHA512fe57d117c1c8da8157387bde5ed2a28dec5a34a20227e588dd30b434e09dc77662ea9a8c6cb8787a32eb11733cf1c65fe181208c2f3e51af8da348829a22c132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ad3e4c44e7a33c954e8f843d7a4e87
SHA1f428b53af6c4d9b237b6bd72104fa627571a5bba
SHA25607bed5cf2620130be71e446e006ea612fe184b3ae8fe4e3099150946d3fe1872
SHA5127733dc586a103cbd1de8389dee0c0e6c13dba3b505fd0c31b9d5c198d3dfd1bc3ca28a3d2c2514d1b6c2902c5efa4dc4d241bda1f0401a3f24700ab8e88ae119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b9d614edec525b0e87969e4d9a5d93
SHA107f550b624ecd28165a4aaf12156511d323a2775
SHA25669a15e33779158fcfc89ca4f8e8d422d97454e1be8c638dadf953cf01d60a5ff
SHA5120f5bbcffcad2d4a246d8403285a837e9695d70aa84ef5b2a38fa0a1b1593ce60d5ae03c78b5811966b0e64969b178e0183c6fd40660c7f47f195e3f79fdfa554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bfd732783a21d6f329ce7c7b67fe1c8
SHA1dbb94e98fe336f78d07fbd4d2edcd1572314b5df
SHA2562f2284efae87d701f66709597b55bc54a764756134e62538a3670c93e77ed80c
SHA5123158011957cbea66e1a852111aa8474cf1fdfcd78837832db459fbb0c6e13b8e653a214a300351da08077d180242a0fc1e521972c9b2fb42ba128ca788b85b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062b9ea37d6fbd2065d1ff3e2ab2c0f3
SHA1377aa402acac6ab18a4620c39957daefd7373811
SHA256ca6d72dda525d60428d0fcb36bc01b0d5fb7186ccda1c8e3fb5279acd73429f9
SHA51283d6cf9608ae2a25e4161fb2db7d6128fc5f0d5c17ba07bc3f5c0d531d639cbc0bb5f712d2b956ef9ace31ced76c5cecb03f24e55334e4c6f3e05e8e1f2bb8fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc9b347075aed273b10afe6caa86b6c3
SHA1f30a7aa8e098081ca69769f4f5e84d491c5ecf8a
SHA256c5fb3e57a4f3effa5f822627929875877639eac2d3ff6945f5eaf776310fe9a3
SHA512df2fc873793ea242ee2f9cb0de50733cd91163ae6154c6cbb9e9dc9298686ce5df4f9563a6a91d91d57d33243f34b660a974881fac57dc613c68dd39949cf6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa17f96ca642416c43ef21b7e47d1015
SHA1c30110056ad31fdada0a0192cbb080bfa215f4e3
SHA256a68fce28459d5fe727b14f2c0306488bd49d15afd255ba3835b6ab52d16b60a3
SHA512d8322ba1fea01900ae6b5a7e5d0e31f5dbc581df9e462e867255f6fe0f7649ef95087ab99619625c05c773ba248b597930340a3507363075d1303fb7a1642d78
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
37KB
MD567841544563cccfe4af2bddb9387b8e0
SHA133aece4df3af4dc2e12f9c25752725d1957767ec
SHA2560ced73ea2ffceb9d8004b2f61439691b4dc54a88ce6ed6359fb6b1d0ae09ba16
SHA512e84400fd9837ce132ae69e1fb8419fbdf9ec8c960a84aad6dda93cfafef2e5c168c4420bb5bb35a198e206a2c069f1ce1ad064d1bac105fa5c999f867d93bc64